US20020114455A1 - Digital copying method and storage device for digital content - Google Patents

Digital copying method and storage device for digital content Download PDF

Info

Publication number
US20020114455A1
US20020114455A1 US10/013,607 US1360701A US2002114455A1 US 20020114455 A1 US20020114455 A1 US 20020114455A1 US 1360701 A US1360701 A US 1360701A US 2002114455 A1 US2002114455 A1 US 2002114455A1
Authority
US
United States
Prior art keywords
digital content
copy
encrypted
copies
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/013,607
Other versions
US7225340B2 (en
Inventor
Takeshi Asahi
Jun Kitahara
Toru Owada
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Maxell Ltd
Original Assignee
Hitachi Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Ltd filed Critical Hitachi Ltd
Assigned to HITACHI, LTD. reassignment HITACHI, LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ASAHI, TAKESHI, KITAHARA, JUN, OWADA, TORU
Publication of US20020114455A1 publication Critical patent/US20020114455A1/en
Application granted granted Critical
Publication of US7225340B2 publication Critical patent/US7225340B2/en
Assigned to HITACHI CONSUMER ELECTRONICS CO., LTD. reassignment HITACHI CONSUMER ELECTRONICS CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HITACHI, LTD.
Assigned to HITACHI MAXELL, LTD. reassignment HITACHI MAXELL, LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HITACHI CONSUMER ELECTRONICS CO, LTD., HITACHI CONSUMER ELECTRONICS CO., LTD.
Assigned to MAXELL, LTD. reassignment MAXELL, LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HITACHI MAXELL, LTD.
Adjusted expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/00746Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
    • G11B20/00753Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00246Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a local device, e.g. device key initially stored by the player or by the recorder
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91357Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
    • H04N2005/91364Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled

Definitions

  • the present invention relates to a method and device for protecting digital content, and more particularly to a digital copying method and storage device for digital content whereby the quality of the digital content deteriorates when a digital copy is made.
  • the copying of digital content has no flexibility and either a complete copy is possible or no copy can be made at all.
  • a complete copy is a copy of a quality such that the content user cannot perceive a difference in quality between the digital content of the copy source and the digital content of the copy destination. If there is no flexibility in the copying of digital content, such as if it were made impossible to make a copy from content data of a generation for which copying is not permitted, a user of the digital content might be limited in making copies for personal use, which was originally possible. It is possible to make a complete copy, for which the quality of the content is not changed at all, from content data of a generation for which copying is permitted. In the case of fraudulently repeating the copying process, however, this is a problem from the perspective of copyright protection.
  • digital content is generated by producing copies of a first digital content and encrypting each copy. At least some of the copies have a lower level of quality than other copies.
  • the digital content comprises the set of encrypted copies. Further in accordance with the invention, the digital content so produced is copied by decrypting the digital content. The result is a set of digital content comprising an unencrypted copy and one or more encrypted copies.
  • FIG. 1 is a drawing showing the constitution of the storage device 200 relating to the embodiment
  • FIG. 2 is a drawing showing the constitution of the data generating device 100 relating to the embodiment
  • FIG. 3 is a drawing showing the internal constitution of the data generating portion 300 relating to the embodiment
  • FIG. 4 is a drawing showing the internal constitution of the digital output portion 700 relating to the embodiment
  • FIG. 5 is a drawing showing the data structure of the encrypted set of encoded digital content 500 relating to the embodiment
  • FIG. 6 is a drawing showing the internal constitution of the analog output portion 400 relating to the embodiment
  • FIG. 7 is a drawing showing the constitution of the storage device 600 relating to the embodiment.
  • FIG. 8 is a drawing showing the constitution of the digital output portion 800 relating to the embodiment.
  • FIG. 9 is a drawing showing the data structure of the encrypted set of encoded digital content 900 relating to the embodiment
  • FIG. 10 is a drawing showing the constitution of the data generating portion 1000 relating to the embodiment.
  • FIG. 11 is a drawing showing the constitution of the storage device 1100 relating to the embodiment.
  • FIG. 12 is a drawing showing the digital content with appended deterioration conditions relating to the embodiment.
  • FIG. 13 is a drawing showing a system comprising a digital transmission path, a copy source storage device connected thereto, and a copy destination storage device, according to an embodiment of the invention.
  • the first data generating method relating to the present invention comprises: generating a plurality of copies of encoded digital content of different levels of quality; using encryption to limit the usable encoded digital content of each copy; and combining the encrypted copies to generate a set of encrypted encoded digital content.
  • FIG. 1 shows the constitution of a storage device 200 for registering digital content and putting out copies of the registered digital content.
  • the memory 212 is a mechanism for storing the registered digital content.
  • the data generating portion 300 is a mechanism for storing a set of the content, generated by encrypting the original content, which has been input from the digital content input 201 or analog content input 202 and digitized, zero times, one time, two times, , to the memory 212 .
  • the digital output portion 700 takes the content from the memory 212 , decrypts the content once only, and outputs the content from the digital copy output 204 .
  • the analog output portion 400 takes the set of content from the memory 212 , extracts content that is not encrypted from the set of content, converts it to analog content, and outputs it from the analog content output 203 .
  • the digital copy input 205 inputs and stores to the memory 212 a copy of the set of content output from the digital copy output 204 of the storage device 200 or a set of content output from a storage device 200 of another copy source.
  • the set of content stored in the memory 212 is not directly output outside this system as digital data. This is to prevent the digital copying of complete copies of the digital content.
  • the memory 212 does not specify a physical medium.
  • the storage device 200 may be realized with a computer system including the memory 212 , a storage subsystem, a digital content storage device, a digital content playback device, or the like.
  • FIG. 2 is a drawing of a constitution wherein the data generating device 100 comprises a section of the storage device 200 having the data generating portion 300 as its core.
  • the data generating portion 300 converts the digital content input from the digital content input 201 or the analog content input from the analog content input 202 to a set of encrypted encoded digital content and stores this set to the memory 212 .
  • This set of encrypted encoded digital content is a collection of a plurality of copies of encrypted encoded digital content of mutually different qualities.
  • This set of encrypted encoded digital content stored in the memory 212 is output from the data output 103 .
  • the digital output can be recorded (stored) in non-volatile form, such as digital tape, digital compact disc, or the like.
  • the data generating device preferably is available only to the originator of the content (e.g., artist, production house, manufacturing facility, and so on).
  • FIG. 3 is a drawing showing the internal constitution of the data generating portion 300 .
  • the decoder 311 decodes the digital content encoded by data compression and input from the digital content input 201 and outputs the decoded content to the selector 319 .
  • the A/D converter 312 converts the input from the analog content input 202 to digital content data and outputs the data to the selector 319 .
  • the selector 319 outputs the input from the decoder 311 or the input from the AID converter 312 to the encoder 314 .
  • the encoding parameter generator 315 outputs one or more encoding parameters to the encoder 314 .
  • the encoder 314 converts the input from the selector 319 to produce one or more copies of encoded digital content on the basis of the one or more encoding parameters input from the encoding parameter generator 315 and outputs the encoded content which is then supplied to the encryption mechanism 316 .
  • Each copy of encoded digital content supplied to the encryption mechanism 316 is an encoded version of the digital content received at the digital content input 201 that has been encoded based on the encoding parameter.
  • the encoder 314 applies each of the one or more encoding parameters to the input received from the encoding parameter generator 315 to produce the one or more copies of encoded digital content.
  • each successive copy of encoded digital content may be produced from a preceding copy of encoded digital content.
  • a first encoding parameter is applied to the input received from the encoding parameter generator 315 to produce a first copy of encoded digital content.
  • a second encoding parameter is applied to the first copy of encoded digital content to produce a second copy encoded digital content.
  • a third encoding parameter is applied to the second copy of encoded digital content to produce a third copy of encoded digital content, and so on. Variations of this alternative are possible; for example, the same encoding parameter can be used to produce the second and third (and subsequent) encoded digital content.
  • the portion 318 for adding the initial value of the usability information adds the initial value of the usability information output from the initial value of usability information storing portion 313 to the encoded digital content.
  • the encryption key storing portion 317 outputs the encryption key to the encryption mechanism 316 .
  • the encryption mechanism 316 further encrypts the one or more copies of encoded digital content output by the encoder 314 and the encrypted encoded digital content output by the encryption mechanism 316 and outputs and stores this content to the memory 212 .
  • Each copy of encrypted digital content is an encrypted version of the digital content received by the encryption mechanism 316 that has been encrypted one or more times.
  • FIG. 4 is a drawing showing the internal constitution of the digital output portion 700 .
  • the decryption mechanism 711 decrypts and outputs ( 204 ) the encrypted encoded digital content one time using the decryption key output by the decryption key storing portion 712 .
  • the digital output 204 can be recorded (stored) in non-volatile form, such as digital tape, digital compact disc, or the like.
  • the encryption key output by the encryption key storing portion 317 and the decryption key output by the decryption key storing portion 712 may be established at the time of the production of the storage device 200 or may be set from outside the system.
  • the decryption key storing portion 712 outputs the set decryption key.
  • the encryption key set in the encryption key storing portion 317 and the decryption key set in the decryption key storing portion 712 are identical values. In that case, encryption key storing portion 317 and decryption key storing portion 712 may be combined into one because they output the same value.
  • FIG. 5 is a drawing showing the data structure of the set of encrypted encoded digital content 500 .
  • the set of encrypted encoded digital content 500 includes one or more copies of encoded digital content 1 ( 511 ), 2 ( 521 ), 3 ( 531 ).
  • Each copy of encoded digital content comprises usability information 1 ( 512 ), 2 ( 522 ), 3 ( 532 ).
  • the usability information is used as a header for determining whether the encoded digital content is usable.
  • the copies of encoded digital content 1 ( 511 ), 2 ( 521 ), 3 ( 531 ) are content which have been encrypted zero times, once, and twice respectively, along with the usability information 1 ( 512 ), 2 ( 522 ), 3 ( 532 ) associated with each.
  • the quality thereof deteriorates in ascending order.
  • the set of encrypted encoded digital content 500 is arranged in the following order: usability information 1 ( 512 ), encoded digital content 1 ( 511 ), usability information 2 ( 522 ), encoded digital content 2 ( 521 ), usability information 3 ( 532 ), and encoded digital content 3 ( 531 ).
  • the usability information 1 ( 512 ), 2 ( 522 ), 3 ( 532 ) have the same set length and match the block size of the encryption algorithm used in the encryption mechanism.
  • the block size of the encryption algorithm is the smallest unit of data to be encrypted or decrypted.
  • the encoded digital content 1 ( 511 ), 2 ( 521 ), 3 ( 531 ) are each of variable length, and each stores its data size as encoding information. Consequently, the position of each copy of encoded digital content within the set of encrypted encoded digital content can be found from the data size of the initial copy of encoded digital content. Also, the encoding information of the encoded digital content stores the encoding format, data size, sampling rate, and quantum bit number.
  • the level of quality does not have to decrease with each successive copy of digital content, as indicated in FIG. 5. It may be desirable that the level of quality decreases with each successive copy of digital content other than in the manner shown in FIG. 5.
  • first and second copies may have the same level of quality, while a third copy has a decreased level of quality, and a fourth copy has an even lower level of quality.
  • a first copy may have a level of quality that is ‘lower’ than a second copy.
  • the level of quality varies among the copies of digital content in the set of encrypted encoded digital content, but is not limited to how the level of quality is distributed among the copies.
  • the data generating device 100 processes the digital content input from the digital content input 201 or the analog content input from the analog content input 202 with the data generating portion 300 , generates a set of encrypted encoded digital content and stores this set in the memory 212 .
  • the set of encrypted encoded digital content stored in the memory 212 is output from the data output 103 .
  • the data format of digital content which can be input to the data generating device 100 is a data format that can be decoded by the decoder 311 .
  • the decoder 311 may also be replaced to match a data format which can be input.
  • the analog content is first converted to digital content by the A/D converter 312 .
  • the encoder 314 encodes the decoded, or converted by the A/D converter, digital content with one or more encoding parameters into encoded digital content with one or more levels of quality.
  • the encoding parameters are parameters for determining the quality of digital content when the digital content is encoded. Quality is determined by encoding parameters such as the quantum bit number or sampling rate. The level of quality when the digital content is played back corresponds to the amount of effective information per unit playback time. The amount of effective information is based on the original content information and can be quantified by a percentage of the original content information retained in a copy of that content. For example, an amount of effective information of 50% means that, for any encoding system, the copied content retains 50% of the amount of information of the original content and the remaining 50% is meaningless information not found in the original.
  • the encoding parameters are generated by the encoding parameter generator 315 . The encoding parameters generated by the encoding parameter generator 315 can be provided from outside the system.
  • a method for generating the set of the encrypted encoded digital content 500 shown in FIG. 5 from digital content, which has been decoded by the decoder 311 or converted by the A/D converter 312 will be discussed as an example.
  • the digital content is encoded into the encoded digital content 1 ( 511 ), 2 ( 521 ), 3 ( 531 ) using three encoding parameters.
  • the number of copies of encoded digital content may be a number other than three.
  • analog content which is to undergo A/D conversion by the A/D converter 312 may be used instead of the digital content decoded by the decoder 311 .
  • the encoded digital content 1 ( 511 ) has the highest quality
  • the encoded digital content 2 ( 521 ) has been next best level of quality
  • the encoded digital content 3 ( 531 ) has the lowest level of quality.
  • An initial value V is added as the usability information 1 ( 512 ), 2 ( 522 ), 3 ( 532 ) to each copy of encoded digital content 1 ( 511 ), 2 ( 521 ), 3 ( 531 ) by the portion 318 for adding usability information.
  • the initial value V of the usability information is stored in the storing portion 313 for the initial value of the usability information.
  • the usability information undergoes encryption and decryption as part of the encoded digital content and its value changes.
  • the usability information becomes equal to the initial value V and shows that the encoded digital content is usable.
  • the usability information becomes a value different from the initial value V and shows that the content is not usable.
  • the encoded digital content with the added usability information is then encrypted by the encryption mechanism 316 .
  • Encryption is performed with symmetrical key encryption.
  • Symmetrical key encryption is an encryption algorithm wherein the same key K is used for encryption and decryption.
  • the encryption mechanism 316 can perform encryption a plurality of times using same key K by using the output as input.
  • the key K is stored in the encryption key storing portion 317 and output to the encryption mechanism 316 .
  • the encryption mechanism 316 encrypts the encoded digital content 1 ( 511 ), 2 ( 521 ), 3 ( 531 ) zero times, once, and twice respectively using counter control.
  • the encrypted encoded digital content is collected and stored in the memory 212 as the set of encrypted encoded digital content 500 shown in FIG. 5.
  • Encryption and decryption are paired processes.
  • the encoded digital content is encrypted a certain number of times with the key K
  • the original encoded digital content can be used if decrypted the same number of times using the key K.
  • encoded digital content for which either encryption or decryption has been performed a greater number of times it is difficult to use the original encoded digital content because the encryption or decryption which has been performed a greater number of times corresponds to the state of having been performed the difference between those numbers of times. Consequently, by decrypting the encoded digital content contained in the set of encrypted encoded digital content 500 different numbers of times, only the encoded digital content for which the number of encryptions and number of decryptions match can be used.
  • the set of encrypted encoded digital content 500 is generated by the data generating portion 300 and stored in memory 212 .
  • the encoded digital content 1 ( 511 ) is usable because it has not been encrypted.
  • the encoded digital content 2 ( 521 ) and 3 ( 531 ) are not usable because they have been encrypted.
  • the encoded digital content 2 ( 521 ) becomes usable because the numbers of encryptions and decryptions are equal.
  • the encoded digital content 1 ( 511 ) is unusable because it is in a state where decryption has been performed one more time than encryption; the encoded digital content 3 ( 531 ) is unusable because it is in a state where encryption has been performed one more time than decryption.
  • the encoded digital content 3 ( 531 ) becomes usable because the numbers of encryptions and decryptions are equal.
  • the encoded digital content 1 ( 511 ) is unusable because it is in a state where decryption has been performed two times more than encryption; and the encoded digital content 2 ( 521 ) is unusable because it is in a state where decryption has been performed one time more than encryption.
  • the quantity of usable content included in the set of encrypted encoded digital content 500 can be limited. Furthermore, by decrypting the set of encrypted encoded digital content 500 one time when it is copied, the usable encoded digital content can be changed. In this instance, information regarding the number of generations of the copy from the original is not necessary.
  • the person who created the content sets a plurality of different encoding parameters and by generating the set of encrypted encoded digital content 500 , can generate a set of encrypted encoded digital content 500 wherein the playback contents are changed when it is decrypted and copied. Furthermore, the correspondence between the number of times a copy is made, meaning the number of times it is decrypted, and the usable encoded digital content can be determined when the set of encrypted encoded digital content is generated.
  • a first copying method relating to the present invention is explained next.
  • the usable encoded digital content in the set of encrypted encoded digital content stored in the memory 212 of the copy source storage device 200 is made unusable by being decrypted and other encoded digital content is made usable and output to the copy destination storage device 200 , whereby digital copying of a complete copy is prevented.
  • the digital output portion 700 shown in FIG. 4 changes the usable encoded digital content by decrypting the set of encrypted encoded digital content stored in the memory 212 one time and outputs the decrypted set of encoded digital content from the digital copy output 204 .
  • the analog output portion 400 shown in FIG. 6 extracts usable encoded digital content from the set of encrypted encoded digital content stored in memory 212 , decodes the extracted encoded digital content, and plays back the content as analog content from the analog content output 203 .
  • the encoded digital content extracting portion 420 checks the usability information of each copy of encoded digital content included in the set of encrypted encoded digital content input and outputs the usable encoded digital content to the decoder 430 . For example, when the set of encrypted encoded digital content shown in FIG. 5 is copied for the first time, usability information 1 ( 512 ) is the initial value V and shows that the content is usable; therefore, the encoded digital content 1 ( 511 ) is usable.
  • the decoder 430 decodes the encoded digital content output by the encoded digital content extracting portion 420 and outputs the digital content to the D/A converter 440 .
  • the D/A converter 440 performs D/A conversion of the digital content output by the decoder 430 and outputs the results from the analog content output 203 .
  • the output of the set of encrypted encoded digital content 500 stored in the memory 212 includes analog output for playing back the content and digital output for copying the content.
  • the content is output in analog form using output devices such as a display or speakers.
  • output devices such as a display or speakers.
  • the content is output in a usable digital format in the state where it is not protected by encryption or the like outside of the storage device 200 , it becomes possible to make a copy of the same quality as the original by digital copying.
  • output with the object of playing back the content from the storage device 200 is only in an analog format from the analog output portion 400 .
  • the digital output portion 700 decrypts the set of encrypted encoded digital content stored in the memory 212 one time with the decryption mechanism 711 using the decryption key output by the decryption key storing portion 712 and changes and outputs the usable digital content. In this way, the set of encrypted encoded digital content output by the digital output portion 700 is output from the digital copy output 204 and sent to the copy destination storage device 200 .
  • the copy destination storage device 200 has the same constitution as the copy source storage device 200 .
  • the copy destination storage device receives the set of encrypted encoded digital content, decrypted once and output from the copy source storage device, from the digital copy input 205 .
  • the initial set of encrypted encoded digital content stored in the memory 212 of the copy source storage device is decrypted once and the quality of the usable encoded digital content is changed.
  • the quality of the digital content usable by the copy source storage device, in the set of encrypted encoded digital content received is less than the quality of the original digital content usable by the copy source storage device.
  • the usable and original encoded digital content, in the set of encrypted encoded digital content stored in the memory of the copy source storage device, is made unusable by decryption and encoded digital content of lesser quality is made usable and output to the copy destination storage device.
  • the quality of the content can thereby be degraded for each successive copy in the order determined by the creator of the set of encrypted encoded digital content.
  • the making of complete copies through digital copying can be prevented.
  • a second copying method relating to the present invention is explained next using FIG. 7.
  • the making of complete copies through digital copying is prevented by degrading the quality of a digital content stored in the memory 212 of the copy source storage device and outputting that content to a copy destination storage device.
  • FIG. 7 is a drawing showing the constitution of the copy source storage device 600 and copy destination storage device 600 to which the second copying method is applied.
  • the copy source storage device 600 and copy destination storage device 600 have the same constitution.
  • the second copying method there is no portion corresponding to the data generating portion 300 shown in the first data generating method.
  • Storage to the memory 611 is accomplished just by storing one copy of digital content simply encoded to the memory 611 .
  • the digital copy input 601 inputs original encoded digital content, or encoded digital content output from the digital copy output 603 of the storage device 600 or from another copy source storage device 600 and stores that content to the memory 611 .
  • the decoder 614 decodes the encoded digital content stored in memory 611 and outputs the digital content to the D/A converter 612 and encoder 613 .
  • the D/A converter 612 converts the digital content output by the decoder 614 to analog content and outputs the analog content from the analog content output 602 .
  • the parameter deterioration mechanism 615 converts the encoding parameters of the digital content output by the decoder 614 to further deteriorated parameters and outputs the parameters to the encoder.
  • the encoder 613 encodes the digital content output by the decoder 614 with the encoding parameters output from the parameter deterioration mechanism 615 and outputs the encoded content to the digital copy output 603 .
  • the storage devices 600 stores digital content input from outside the system and outputs the content in an analog format to be played back or in a digital format to be copied. In order to prevent complete copying of digital contents, the storage device 600 degrades the quality of the digital content from that stored in the memory 611 and outputs that content when performing digital copying. When playing back the content, the storage device outputs the content only in the analog format.
  • the digital content when high-quality digital content stored in memory 611 is played back, the digital content is decoded by the decoder 614 , undergoes D/A conversion by the D/A converter 612 , and is output in analog form through the analog content output 602 . Because the digital content is degraded by D/A conversion, that content cannot be returned to the same quality as the original digital content by A/D conversion. Also, when high-quality digital content stored in memory 611 is copied, the digital content is decoded by the decoder 614 , encoded by the encoder 613 , and output outside the system through the digital copy output 603 .
  • the encoding parameters used by the encoder 613 are found by degrading the encoding parameters of the highest quality digital content stored in the memory 611 with the parameter deterioration mechanism 615 . Because the encoding parameters of the digital content can be decoded by the decoder 614 , those encoding parameters are deteriorated. For example, the encoding parameters are degraded by reducing the quantum bit number or sampling rate. Because the encoder 613 uses these degraded encoding parameters, the quality of the digital content output becomes degraded compared that of the highest quality digital content stored in memory 611 . The creation of copies of equivalent quality from the digital content output is thereby prevented.
  • the quality of the digital content stored in the memory of the copy source storage device is degraded and output to a copy destination storage device. Copying is thereby performed with the content in a degraded state. Also, digital copying of a complete copy can be prevented.
  • the parameter deteriorating mechanism 615 automatically deteriorates the encoding parameters. Therefore, when a user outputs a digital copy from the memory 611 , the user cannot touch those encoding parameters.
  • a third copying method relating to the present invention is explained next using FIG. 8.
  • the usable encoded digital content in the set of encrypted encoded digital content stored in the memory of the copy source storage device is changed and output to a copy destination storage device, with encoded digital content which was previously usable deleted. Digital copying of a complete copy can thereby be prevented.
  • the usable encoded digital content is changed by first decrypting the set of encrypted encoded digital content stored in the memory and the set of encrypted encoded digital content, wherein the encoded digital content of lesser quality is usable, is output.
  • the good quality encoded digital content which is usable when stored in the memory, is removed from the set of encrypted encoded digital content before decryption.
  • the storage device to which is applied the third copying method relating to the present invention is constituted by replacing the digital output portion 700 of the storage device 200 with the digital output portion shown in FIG. 8.
  • Other elements constituting the storage device 200 such as the memory 212 , data generating portion 300 , and analog output portion 400 , are the same as in the storage device 200 shown in FIG. 1.
  • the set of encrypted encoded digital content 500 in the data format shown in FIG. 5, is stored in the memory 212 .
  • the deletion mechanism 813 determines the usable encoded digital content from the set of encrypted encoded digital content stored in memory 212 , removes that encoded digital content and the usability information corresponding thereto, and sends this content and information to the decryption mechanism 811 .
  • the deletion mechanism 813 If there is no usable encoded digital content in the set of encrypted encoded digital content, the deletion mechanism 813 is just bypassed.
  • the decryption mechanism 811 uses the decryption key output by the decryption key storing portion 812 and decrypts the set of encrypted encoded digital content sent from the deletion mechanism 813 .
  • the previously usable encoded digital content is removed and output from the set of encrypted encoded digital content stored in memory of the copy source storage device.
  • the quality of the copied content can thereby be deteriorated in an order determined by the creator of the set of encrypted encoded digital content.
  • complete copying by digital copying can be prevented. Even if the encryption key is decoded, the use of high-quality digital content in copying is prevented.
  • the first copying method is a method wherein the encoded digital content itself is encrypted a plurality of times and decrypted each time a copy is made.
  • the fourth copying method is a method wherein the encoded digital content is encrypted with mutually different content keys, and the content keys are encrypted a plurality of times and decrypted when a copy is made.
  • the set of encrypted encoded digital content 900 shown in FIG. 9 comprises encoded digital content 1 ( 911 ), 2 ( 921 ), 3 ( 931 ), content keys corresponding to each copy of encoded digital content 1 ( 913 ), 2 ( 923 ), 3 ( 933 ), and usability information corresponding to each content key 1 ( 912 ), 2 ( 922 ), 3 ( 932 ).
  • This explanation uses three sets of encoded digital content, content keys, and usability information, but there is no limit to the number of these groups included in the set of encrypted encoded digital content.
  • Each copy of encoded digital content is encrypted with its content key 1 ( 913 ), 2 ( 923 ), 3 ( 933 ).
  • the content keys 1 ( 913 ), 2 ( 923 ), 3 ( 933 ) may be the same encryption key or different encryption keys.
  • the content keys each have appended usability information corresponding thereto and are encrypted, along with the usability information, different numbers of times with the key K.
  • the initial values V of the usability information appended to each of the content keys are all the same constant.
  • the copy source storage device decrypts and outputs the content key and associated usability information one time.
  • the number of encryptions of the content key and usability information matches the number of copies, meaning the number of decryptions, of the set of encrypted encoded digital content 900
  • the content key and usability information are returned to a state wherein encryption has not been performed.
  • the content key becomes usable.
  • the usability information matches the initial value V and shows that the content key is usable.
  • the copy destination storage device can decrypt and use the encoded digital content using the corresponding content key.
  • the content key and usability information When the number of encryptions of the content key and usability information does not match the number of copies, meaning the number of decryptions, of the set of encrypted encoded digital content 900 , the content key and usability information are in a state where encryption or decryption has been performed and cannot be used. As a result, the corresponding encoded digital content is unusable.
  • the constitution of the storage device to which the fourth copying method is applied has the same constitution as the storage device 200 shown in FIG. 1.
  • the encryption mechanism 316 of the data generating portion 300 encrypts each copy of encoded digital content in the set of encrypted encoded digital content one time only with the corresponding content key.
  • the encryption mechanism 316 uses a separate encryption key and encrypts the usability information 1 ( 912 ) and content key 1 ( 913 ) zero times, the usability information 2 ( 922 ) and content key 2 ( 923 ) one time, and the usability information 3 ( 932 ) and content key 3 ( 933 ) two times. This decryption may also be applied to the encrypted encoded digital content.
  • the decryption mechanism 711 of the digital output portion 700 decrypts the usability information and content key (and encoded digital content) corresponding to each copy of encoded digital content one time only. Also, the decoder 430 of the analog output portion 400 carries out processing to decrypt the usable encoded digital content with the corresponding content key.
  • the usable encoded digital content in the set of encrypted encoded digital content 900 is changed by performing decryption when a copy is made from the copy source storage device to the copy destination storage device. It thereby becomes possible to change the quality of the content each time a copy is made in an order determined by the creator of the set of encrypted encoded digital content. Also, digital copying of a complete copy can be prevented.
  • a second data generating method relating to the present invention is explained next.
  • content data with a plurality of different qualities is generated by changing the encoded parameters of the input content and the set of encrypted encoded digital content is generated.
  • the quality of the digital content can be changed by changing encoding parameters such as the quantum bit number and sampling rate.
  • the quality of that digital content can be changed by changing the amount of information transmitted.
  • data comprising content of reduced quality is generated by deleting or hiding by encryption part of the content input.
  • the data generating device to which the second data generating method is applied has the constitution of the data generating device 100 .
  • the data generating device 100 has the constitution of the data generating portion 1000 shown in FIG. 10 instead of the data generating portion 300 .
  • the digital content input to the digital content input 201 in FIG. 1 is input to the data generating portion 1000 .
  • the data generating portion 1000 converts the input digital content to three sets of data, data 1 , data 2 , data 3 , with mutually different portions deleted by the converting portion 1011 .
  • the conversion to data with part of the digital content deleted is performed by extracting the undeleted portions from the entire digital content.
  • the amount of data output by the converting portion 1011 can be controlled from outside the system.
  • this amount is three, but may also be a number other than three. It is also possible to hide part of the data with encryption instead of deletion.
  • the encryption key used for the encryption can be provided from outside the system.
  • the three sets of converted data are data 1 with none of the input digital content deleted, data 2 with the final half of the input digital content deleted, and data 3 with the final three quarters of the input digital content deleted.
  • final portion means the portion of the input digital content input later by the data generating device 100 .
  • Final portion may also mean that portion used temporally later in normal use of the content.
  • the scope of each deletion can be indicated from outside the data generating portion 1000 .
  • data 1 is entirely usable, data 2 is half usable, and for data 3 , only one-quarter is not deleted. Accordingly, of the three sets of data, data 1 is of the highest quality, data 2 is of the next best quality, and data 3 is of the lowest quality.
  • the three sets of data generated in this way have usability information added by the usability information adding portion 318 in the same way as in the first data generating method, are encrypted zero times, one time, and two times respectively using a shared key K by the encryption mechanism 316 , and are collected in a single set of data, thereby having the same effect as the set of encrypted encoded digital content generated by the first data generating method. Performing decryption one time when a copy is made results in the generation of data for which the usable content can be changed in the order of data 1 , data 2 , data 3 . This data becomes data of decreasing quality as copying is repeated.
  • the data generated by the second data generating method relating to the present invention can have the usable content changed by decryption in the same way as the set of encrypted encoded data generated by the first data generating method relating to the present invention. Accordingly, the data generated by the second data generating method relating to the present invention can undergo the first, third, and fourth copying methods relating to the present invention.
  • a fifth copying method relating to the present invention is explained next using FIGS. 11, 12, and 13 .
  • complete copying by digital copying can be prevented by degrading the quality of the digital content stored in the memory of the copy source storage device 1 ( 1301 ) shown in FIG. 13 and outputting that content to the copy destination storage device 2 ( 1302 ).
  • the quality of the digital content can be degraded by changing encoding parameters such as the quantum bit number and sampling rate.
  • the quality of that digital content can be degraded by removing part of the transmitted information.
  • the fifth copying method there is no element corresponding to the data generating portion 300 shown in the first data generating method and storage to memory 1111 is accomplished just by storing the single copy of digital content to the memory 1111 .
  • the digital content input 1101 inputs and stores to memory 1111 original digital content or digital content output from the digital copy output 1102 of the storage device 1100 or digital content output from another copy source storage device 1100 .
  • the storage device 1 ( 1301 ) in FIG. 13 corresponds to the storage device 1100 shown in FIG. 11.
  • the storage device 2 ( 1302 ) is a storage device comprising memory.
  • the storage device 2 ( 1302 ) may also have the constitution of the storage device 1100 shown in FIG. 11.
  • the storage device 1 ( 1301 ) processes and outputs the stored digital content through the digital transmission path 1303 , and makes a copy of the digital content to the storage device 2 ( 1302 ).
  • the digital transmission path 1303 can have any physical constitution, logical constitution, or scale so long as the storage device 1 ( 1301 ) and storage device 2 ( 1302 ) can be connected.
  • the storage device 1100 shown in FIG. 11 comprises a digital content input 1101 , memory 1111 , a converter 1112 , and a digital copy output 1102 . Furthermore, the storage device 1100 may also comprise a reproducing portion 1113 for playing back digital content stored in memory 1111 .
  • the memory 1111 stores digital content input from the digital content input 1101 .
  • the converter 1112 comprises a selector 1121 , deteriorating mechanism 1122 , deterioration method extracting portion 1123 , and deterioration scope controller 1124 .
  • the converter outputs the digital content stored in the memory 1111 , with part deleted or hidden by encryption, from the digital copy output 1102 .
  • the digital content 1200 with added deterioration conditions, shown in FIG. 12 comprises digital content 1201 and deterioration conditions 1202 .
  • the digital content 1201 is digital data such as images, music, or text.
  • the deterioration conditions 1202 are parameters indicating the scope and method for degrading the digital content 1201 when a digital copy is made of the digital content 1201 .
  • the storage device 1100 stores the digital content input from the digital content input 1101 to the memory 1111 .
  • the input digital content may also be digital content 1200 with added deterioration conditions, wherein deterioration conditions 1202 showing the scope and method for deteriorating the digital content 1201 are added by the converter 1112 when a copy is made.
  • the storage device 1100 limits the use of the copied content by deleting or hiding with encryption part of the digital content stored in memory 1111 , degrading the quality of the content, and outputs the content.
  • the converter 1112 uses the added deterioration conditions 1202 and deletes or hides with encryption part of the digital content 1201 and outputs the content from the digital copy output 1102 .
  • the deterioration method extracting portion 1123 determines the deterioration method, such as encryption or deletion, from the deterioration conditions 1202 and controls the deterioration mechanism 1122 .
  • the deterioration scope controller 1124 determines the scope of deterioration from the deterioration conditions 1202 and controls the selector 1121 .
  • the selector 1121 receives the original digital content stored in memory 1111 and the digital content deteriorated by the deterioration mechanism 1122 .
  • the selector 1121 chooses the original digital content of the deteriorated digital contents, and outputs it from the digital copy output 1102 .
  • the converter 1112 generates the digital content which deteriorated partially.
  • the deterioration conditions 1202 can be applied when the digital content with added deterioration conditions 1200 is generated.
  • the converter 1112 uses predetermined conditions to delete or hide by decrypting part of the digital content and outputs the content from the digital copy output 1102 .
  • the predetermined conditions for the converter 1112 can be established when the storage device 1100 is manufactured.
  • the reproduction portion 1113 plays back the digital content stored in the memory 1111 as digital data
  • the reproduction portion 1113 reproduces this data inside the storage device 1100 . Therefore, it prevents taking out the complete copy of the digital content from the reproduction portion 1113 outside the system.
  • the reproduction portion 1113 outputs the screen information for displaying the text of contents to an external display out of the storage device 1100 . In this case, because it is difficult to reconstruct text data from the screen information, it can prevent creating the complete copy of digital content from the output of a reproduction portion 1113 .
  • a reproduction portion 1113 when playing back digital contents as analog data, a reproduction portion 1113 outputs analog information to the display or speaker besides the storage device 1100 . Consequently, it can prevent creating the complete copy of digital content from the output of a reproduction portion 1113 .
  • a system 1300 comprises a storage device 1 ( 1301 ) and storage device 2 ( 1302 ) having the same constitution as the storage device 1100 and a digital transmission path 1303 connecting those; and the quality of the digital content copied to the storage device 2 ( 1302 ) is degraded compared to the digital content stored in the storage device 1 ( 1301 ), when the digital content is copied from the copy source storage device 1 ( 1301 ) to the copy destination storage device 2 ( 1302 ). Copying can thereby be performed with the content in a deteriorated state. Digital copying of a complete copy can be prevented as well.
  • the present invention has the effect of being able to support a user's desire to acquire digital content while protecting the rights of creators of digital content.

Abstract

The present invention provides a digital copying method for preventing complete copying by the use of digital copying. A data generating portion includes a storage device which generates a plurality of digital copies having mutually different amounts of effective information from original digital data, and stores the set of digital content having the digital copies encrypted different numbers of times in a memory. A digital output portion decrypts the set of digital content retrieved from the memory a prescribed number of times, making usable and outputting one of the digital copies in the set of digital content. An analog output portion extracts the digital copy that has been encrypted zero times from the set of digital content, converts that copy to analog data, and outputs that data.

Description

    CROSS-REFERENCES TO RELATED APPLICATIONS
  • This application is related to and claims priority from Japanese Patent Application No. 2001-042891 filed on Feb. 20, 2001. [0001]
  • BACKGROUND OF THE INVENTION
  • The present invention relates to a method and device for protecting digital content, and more particularly to a digital copying method and storage device for digital content whereby the quality of the digital content deteriorates when a digital copy is made. [0002]
  • With the dissemination of information technology and the development of networks, the network transmission of digital content, such as music or still or moving images, has become very common. Copyright protection has become a problem of this transmission of digital content. When analog data is copied, the quality of the copy is degraded compared to that of the source. However, digital data can be copied many times with no deterioration of the quality. Consequently, there are no limits to the copying of digital data and it is possible to repeat the copying process and endlessly create data of the same quality as the original data. Moreover, with the realization of today's multi-functional PCs (personal computers), it has become possible to playback music and image content onto a personal computer. On a PC, it is possible to perform various operations that are not possible with devices exclusively for playing back content, such as CD or DVD players. The content data can be copied directly from the CD or DVD. Also, data that has been copied into the PC once can be easily produce many unauthorized copies. [0003]
  • Before now, music and image content was played with dedicated playback devices such as CD or DVD players. It was possible to control the permission to copy the digital content with the dedicated playback devices. For example, the content was encrypted and protected with CSS (Content Scramble System) on DVD. With encrypted content data, the content cannot be played back without a decryption key to cancel the encryption, even if removed directly from the medium. Also, with CGMS (Copy Generation Management System), copy generation management of the content can be performed so that copying from the original is permitted, but copying from a copy is not permitted. [0004]
  • In the case of the above mentioned methods, the copying of digital content has no flexibility and either a complete copy is possible or no copy can be made at all. Here, a complete copy is a copy of a quality such that the content user cannot perceive a difference in quality between the digital content of the copy source and the digital content of the copy destination. If there is no flexibility in the copying of digital content, such as if it were made impossible to make a copy from content data of a generation for which copying is not permitted, a user of the digital content might be limited in making copies for personal use, which was originally possible. It is possible to make a complete copy, for which the quality of the content is not changed at all, from content data of a generation for which copying is permitted. In the case of fraudulently repeating the copying process, however, this is a problem from the perspective of copyright protection. [0005]
  • There is a need for a method for copying digital content, to prevent digital copying of complete copies, for protecting the rights of the creators of digital content while supporting the desire of users to acquire digital content. [0006]
  • SUMMARY OF THE INVENTION
  • In accordance with the invention, digital content is generated by producing copies of a first digital content and encrypting each copy. At least some of the copies have a lower level of quality than other copies. The digital content comprises the set of encrypted copies. Further in accordance with the invention, the digital content so produced is copied by decrypting the digital content. The result is a set of digital content comprising an unencrypted copy and one or more encrypted copies.[0007]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a drawing showing the constitution of the [0008] storage device 200 relating to the embodiment;
  • FIG. 2 is a drawing showing the constitution of the [0009] data generating device 100 relating to the embodiment;
  • FIG. 3 is a drawing showing the internal constitution of the [0010] data generating portion 300 relating to the embodiment;
  • FIG. 4 is a drawing showing the internal constitution of the [0011] digital output portion 700 relating to the embodiment;
  • FIG. 5 is a drawing showing the data structure of the encrypted set of encoded [0012] digital content 500 relating to the embodiment;
  • FIG. 6 is a drawing showing the internal constitution of the [0013] analog output portion 400 relating to the embodiment;
  • FIG. 7 is a drawing showing the constitution of the [0014] storage device 600 relating to the embodiment;
  • FIG. 8 is a drawing showing the constitution of the [0015] digital output portion 800 relating to the embodiment;
  • FIG. 9 is a drawing showing the data structure of the encrypted set of encoded [0016] digital content 900 relating to the embodiment;
  • FIG. 10 is a drawing showing the constitution of the [0017] data generating portion 1000 relating to the embodiment;
  • FIG. 11 is a drawing showing the constitution of the [0018] storage device 1100 relating to the embodiment;
  • FIG. 12 is a drawing showing the digital content with appended deterioration conditions relating to the embodiment; and [0019]
  • FIG. 13 is a drawing showing a system comprising a digital transmission path, a copy source storage device connected thereto, and a copy destination storage device, according to an embodiment of the invention.[0020]
  • DETAILED DESCRIPTION OF THE EMBODIMENTS
  • The illustrative embodiments of the present invention are explained using the drawings. [0021]
  • A first data generating method relating to the present invention is explained. The first data generating method relating to the present invention comprises: generating a plurality of copies of encoded digital content of different levels of quality; using encryption to limit the usable encoded digital content of each copy; and combining the encrypted copies to generate a set of encrypted encoded digital content. [0022]
  • FIG. 1 shows the constitution of a [0023] storage device 200 for registering digital content and putting out copies of the registered digital content. The memory 212 is a mechanism for storing the registered digital content. The data generating portion 300 is a mechanism for storing a set of the content, generated by encrypting the original content, which has been input from the digital content input 201 or analog content input 202 and digitized, zero times, one time, two times, , to the memory 212. The digital output portion 700 takes the content from the memory 212, decrypts the content once only, and outputs the content from the digital copy output 204. The analog output portion 400 takes the set of content from the memory 212, extracts content that is not encrypted from the set of content, converts it to analog content, and outputs it from the analog content output 203. The digital copy input 205 inputs and stores to the memory 212 a copy of the set of content output from the digital copy output 204 of the storage device 200 or a set of content output from a storage device 200 of another copy source. The set of content stored in the memory 212 is not directly output outside this system as digital data. This is to prevent the digital copying of complete copies of the digital content.
  • Moreover, the [0024] memory 212 does not specify a physical medium. Also, the storage device 200 may be realized with a computer system including the memory 212, a storage subsystem, a digital content storage device, a digital content playback device, or the like.
  • FIG. 2 is a drawing of a constitution wherein the [0025] data generating device 100 comprises a section of the storage device 200 having the data generating portion 300 as its core. The data generating portion 300 converts the digital content input from the digital content input 201 or the analog content input from the analog content input 202 to a set of encrypted encoded digital content and stores this set to the memory 212. This set of encrypted encoded digital content is a collection of a plurality of copies of encrypted encoded digital content of mutually different qualities. This set of encrypted encoded digital content stored in the memory 212 is output from the data output 103. The digital output can be recorded (stored) in non-volatile form, such as digital tape, digital compact disc, or the like. The data generating device preferably is available only to the originator of the content (e.g., artist, production house, manufacturing facility, and so on).
  • FIG. 3 is a drawing showing the internal constitution of the [0026] data generating portion 300. The decoder 311 decodes the digital content encoded by data compression and input from the digital content input 201 and outputs the decoded content to the selector 319. The A/D converter 312 converts the input from the analog content input 202 to digital content data and outputs the data to the selector 319. The selector 319 outputs the input from the decoder 311 or the input from the AID converter 312 to the encoder 314. The encoding parameter generator 315 outputs one or more encoding parameters to the encoder 314. The encoder 314 converts the input from the selector 319 to produce one or more copies of encoded digital content on the basis of the one or more encoding parameters input from the encoding parameter generator 315 and outputs the encoded content which is then supplied to the encryption mechanism 316. Each copy of encoded digital content supplied to the encryption mechanism 316 is an encoded version of the digital content received at the digital content input 201 that has been encoded based on the encoding parameter.
  • In one embodiment, the [0027] encoder 314 applies each of the one or more encoding parameters to the input received from the encoding parameter generator 315 to produce the one or more copies of encoded digital content. Alternatively, each successive copy of encoded digital content may be produced from a preceding copy of encoded digital content. Thus, for example, a first encoding parameter is applied to the input received from the encoding parameter generator 315 to produce a first copy of encoded digital content. Next, a second encoding parameter is applied to the first copy of encoded digital content to produce a second copy encoded digital content. A third encoding parameter is applied to the second copy of encoded digital content to produce a third copy of encoded digital content, and so on. Variations of this alternative are possible; for example, the same encoding parameter can be used to produce the second and third (and subsequent) encoded digital content.
  • At this time, the [0028] portion 318 for adding the initial value of the usability information adds the initial value of the usability information output from the initial value of usability information storing portion 313 to the encoded digital content. The encryption key storing portion 317 outputs the encryption key to the encryption mechanism 316. The encryption mechanism 316 further encrypts the one or more copies of encoded digital content output by the encoder 314 and the encrypted encoded digital content output by the encryption mechanism 316 and outputs and stores this content to the memory 212. Each copy of encrypted digital content is an encrypted version of the digital content received by the encryption mechanism 316 that has been encrypted one or more times.
  • FIG. 4 is a drawing showing the internal constitution of the [0029] digital output portion 700. The decryption mechanism 711 decrypts and outputs (204) the encrypted encoded digital content one time using the decryption key output by the decryption key storing portion 712. The digital output 204 can be recorded (stored) in non-volatile form, such as digital tape, digital compact disc, or the like.
  • The encryption key output by the encryption [0030] key storing portion 317 and the decryption key output by the decryption key storing portion 712 may be established at the time of the production of the storage device 200 or may be set from outside the system. The decryption key storing portion 712 outputs the set decryption key. When symmetrical key encryption is used as the encryption algorithm by the encryption mechanism 316 and the decryption mechanism 711, the encryption key set in the encryption key storing portion 317 and the decryption key set in the decryption key storing portion 712 are identical values. In that case, encryption key storing portion 317 and decryption key storing portion 712 may be combined into one because they output the same value.
  • FIG. 5 is a drawing showing the data structure of the set of encrypted encoded [0031] digital content 500. The set of encrypted encoded digital content 500 includes one or more copies of encoded digital content 1 (511), 2 (521), 3 (531). Each copy of encoded digital content comprises usability information 1 (512), 2 (522), 3 (532). The usability information is used as a header for determining whether the encoded digital content is usable. The copies of encoded digital content 1 (511), 2 (521), 3 (531) are content which have been encrypted zero times, once, and twice respectively, along with the usability information 1 (512), 2 (522), 3 (532) associated with each. The quality thereof deteriorates in ascending order. The set of encrypted encoded digital content 500 is arranged in the following order: usability information 1 (512), encoded digital content 1 (511), usability information 2 (522), encoded digital content 2 (521), usability information 3 (532), and encoded digital content 3 (531). The usability information 1 (512), 2 (522), 3 (532) have the same set length and match the block size of the encryption algorithm used in the encryption mechanism. The block size of the encryption algorithm is the smallest unit of data to be encrypted or decrypted. The encoded digital content 1 (511), 2 (521), 3 (531) are each of variable length, and each stores its data size as encoding information. Consequently, the position of each copy of encoded digital content within the set of encrypted encoded digital content can be found from the data size of the initial copy of encoded digital content. Also, the encoding information of the encoded digital content stores the encoding format, data size, sampling rate, and quantum bit number.
  • It is noted that the level of quality does not have to decrease with each successive copy of digital content, as indicated in FIG. 5. It may be desirable that the level of quality decreases with each successive copy of digital content other than in the manner shown in FIG. 5. For example, first and second copies may have the same level of quality, while a third copy has a decreased level of quality, and a fourth copy has an even lower level of quality. As another example, a first copy may have a level of quality that is ‘lower’ than a second copy. In accordance with the invention, the level of quality varies among the copies of digital content in the set of encrypted encoded digital content, but is not limited to how the level of quality is distributed among the copies. [0032]
  • The operation of each portion is explained below. The [0033] data generating device 100 processes the digital content input from the digital content input 201 or the analog content input from the analog content input 202 with the data generating portion 300, generates a set of encrypted encoded digital content and stores this set in the memory 212. The set of encrypted encoded digital content stored in the memory 212 is output from the data output 103.
  • Next the processing in the [0034] data generating portion 300 is discussed. When the input content is digital content, digital content encoded with data compression is first decoded by the decoder 311. The data format of digital content which can be input to the data generating device 100 is a data format that can be decoded by the decoder 311. The decoder 311 may also be replaced to match a data format which can be input. When the input content is analog content, the analog content is first converted to digital content by the A/D converter 312. The encoder 314 encodes the decoded, or converted by the A/D converter, digital content with one or more encoding parameters into encoded digital content with one or more levels of quality. The encoding parameters are parameters for determining the quality of digital content when the digital content is encoded. Quality is determined by encoding parameters such as the quantum bit number or sampling rate. The level of quality when the digital content is played back corresponds to the amount of effective information per unit playback time. The amount of effective information is based on the original content information and can be quantified by a percentage of the original content information retained in a copy of that content. For example, an amount of effective information of 50% means that, for any encoding system, the copied content retains 50% of the amount of information of the original content and the remaining 50% is meaningless information not found in the original. The encoding parameters are generated by the encoding parameter generator 315. The encoding parameters generated by the encoding parameter generator 315 can be provided from outside the system.
  • A method for generating the set of the encrypted encoded [0035] digital content 500 shown in FIG. 5 from digital content, which has been decoded by the decoder 311 or converted by the A/D converter 312, will be discussed as an example. The digital content is encoded into the encoded digital content 1 (511), 2 (521), 3 (531) using three encoding parameters. The number of copies of encoded digital content may be a number other than three. Also, analog content which is to undergo A/D conversion by the A/D converter 312 may be used instead of the digital content decoded by the decoder 311. Of the three copies of encoded digital content, the encoded digital content 1 (511) has the highest quality, the encoded digital content 2 (521) has been next best level of quality, and the encoded digital content 3 (531) has the lowest level of quality. An initial value V is added as the usability information 1 (512), 2 (522), 3 (532) to each copy of encoded digital content 1 (511), 2 (521), 3 (531) by the portion 318 for adding usability information. The initial value V of the usability information is stored in the storing portion 313 for the initial value of the usability information. The usability information undergoes encryption and decryption as part of the encoded digital content and its value changes. When encryption and decryption have been performed the same number of times on the encoded digital content, the usability information becomes equal to the initial value V and shows that the encoded digital content is usable. When encryption and decryption have been performed different numbers of times on the encoded digital content, the usability information becomes a value different from the initial value V and shows that the content is not usable.
  • The encoded digital content with the added usability information is then encrypted by the [0036] encryption mechanism 316. Encryption is performed with symmetrical key encryption. Symmetrical key encryption is an encryption algorithm wherein the same key K is used for encryption and decryption. The encryption mechanism 316 can perform encryption a plurality of times using same key K by using the output as input. The key K is stored in the encryption key storing portion 317 and output to the encryption mechanism 316. The encryption mechanism 316 encrypts the encoded digital content 1 (511), 2 (521), 3 (531) zero times, once, and twice respectively using counter control. The encrypted encoded digital content is collected and stored in the memory 212 as the set of encrypted encoded digital content 500 shown in FIG. 5.
  • Encryption and decryption are paired processes. When the encoded digital content is encrypted a certain number of times with the key K, the original encoded digital content can be used if decrypted the same number of times using the key K. With encoded digital content for which either encryption or decryption has been performed a greater number of times, it is difficult to use the original encoded digital content because the encryption or decryption which has been performed a greater number of times corresponds to the state of having been performed the difference between those numbers of times. Consequently, by decrypting the encoded digital content contained in the set of encrypted encoded [0037] digital content 500 different numbers of times, only the encoded digital content for which the number of encryptions and number of decryptions match can be used.
  • More precisely, the set of encrypted encoded [0038] digital content 500 is generated by the data generating portion 300 and stored in memory 212. At that stage, the encoded digital content 1 (511) is usable because it has not been encrypted. However, the encoded digital content 2 (521) and 3 (531) are not usable because they have been encrypted. When the entire set of encrypted encoded digital content 500 is decrypted one time, the encoded digital content 2 (521) becomes usable because the numbers of encryptions and decryptions are equal. The encoded digital content 1 (511) is unusable because it is in a state where decryption has been performed one more time than encryption; the encoded digital content 3 (531) is unusable because it is in a state where encryption has been performed one more time than decryption. When the set of encrypted encoded digital content 500 is decrypted twice, the encoded digital content 3 (531) becomes usable because the numbers of encryptions and decryptions are equal. However, the encoded digital content 1 (511) is unusable because it is in a state where decryption has been performed two times more than encryption; and the encoded digital content 2 (521) is unusable because it is in a state where decryption has been performed one time more than encryption.
  • Consequently, the quantity of usable content included in the set of encrypted encoded [0039] digital content 500 can be limited. Furthermore, by decrypting the set of encrypted encoded digital content 500 one time when it is copied, the usable encoded digital content can be changed. In this instance, information regarding the number of generations of the copy from the original is not necessary.
  • Accordingly, with the first data generating method relating to the present invention, the person who created the content sets a plurality of different encoding parameters and by generating the set of encrypted encoded [0040] digital content 500, can generate a set of encrypted encoded digital content 500 wherein the playback contents are changed when it is decrypted and copied. Furthermore, the correspondence between the number of times a copy is made, meaning the number of times it is decrypted, and the usable encoded digital content can be determined when the set of encrypted encoded digital content is generated.
  • A first copying method relating to the present invention is explained next. In the first copying method relating to the present invention, the usable encoded digital content in the set of encrypted encoded digital content stored in the [0041] memory 212 of the copy source storage device 200 is made unusable by being decrypted and other encoded digital content is made usable and output to the copy destination storage device 200, whereby digital copying of a complete copy is prevented.
  • The [0042] digital output portion 700 shown in FIG. 4 changes the usable encoded digital content by decrypting the set of encrypted encoded digital content stored in the memory 212 one time and outputs the decrypted set of encoded digital content from the digital copy output 204.
  • The [0043] analog output portion 400 shown in FIG. 6 extracts usable encoded digital content from the set of encrypted encoded digital content stored in memory 212, decodes the extracted encoded digital content, and plays back the content as analog content from the analog content output 203. The encoded digital content extracting portion 420 checks the usability information of each copy of encoded digital content included in the set of encrypted encoded digital content input and outputs the usable encoded digital content to the decoder 430. For example, when the set of encrypted encoded digital content shown in FIG. 5 is copied for the first time, usability information 1 (512) is the initial value V and shows that the content is usable; therefore, the encoded digital content 1 (511) is usable. The decoder 430 decodes the encoded digital content output by the encoded digital content extracting portion 420 and outputs the digital content to the D/A converter 440. The D/A converter 440 performs D/A conversion of the digital content output by the decoder 430 and outputs the results from the analog content output 203.
  • The output of the set of encrypted encoded [0044] digital content 500 stored in the memory 212 includes analog output for playing back the content and digital output for copying the content.
  • When the object is to playback the content, the content is output in analog form using output devices such as a display or speakers. When the content is output in a usable digital format in the state where it is not protected by encryption or the like outside of the [0045] storage device 200, it becomes possible to make a copy of the same quality as the original by digital copying. In order to prevent such digital copying, output with the object of playing back the content from the storage device 200 is only in an analog format from the analog output portion 400.
  • When the object is to make a copy of the content, outputting the set of encrypted encoded digital content stored initially in the [0046] memory 212 without change makes it possible to make a complete copy of the same quality as the original of the encoded digital content 1 (511). In order to prevent the creation of copies without altered quality, the digital output portion 700 decrypts the set of encrypted encoded digital content stored in the memory 212 one time with the decryption mechanism 711 using the decryption key output by the decryption key storing portion 712 and changes and outputs the usable digital content. In this way, the set of encrypted encoded digital content output by the digital output portion 700 is output from the digital copy output 204 and sent to the copy destination storage device 200. The copy destination storage device 200 has the same constitution as the copy source storage device 200. The copy destination storage device receives the set of encrypted encoded digital content, decrypted once and output from the copy source storage device, from the digital copy input 205. The initial set of encrypted encoded digital content stored in the memory 212 of the copy source storage device is decrypted once and the quality of the usable encoded digital content is changed. As a result, the quality of the digital content usable by the copy source storage device, in the set of encrypted encoded digital content received, is less than the quality of the original digital content usable by the copy source storage device.
  • As above, in the first copying method relating to the present invention, the usable and original encoded digital content, in the set of encrypted encoded digital content stored in the memory of the copy source storage device, is made unusable by decryption and encoded digital content of lesser quality is made usable and output to the copy destination storage device. The quality of the content can thereby be degraded for each successive copy in the order determined by the creator of the set of encrypted encoded digital content. Moreover, the making of complete copies through digital copying can be prevented. [0047]
  • A second copying method relating to the present invention is explained next using FIG. 7. In the second copying method relating to the present invention, the making of complete copies through digital copying is prevented by degrading the quality of a digital content stored in the [0048] memory 212 of the copy source storage device and outputting that content to a copy destination storage device.
  • FIG. 7 is a drawing showing the constitution of the copy [0049] source storage device 600 and copy destination storage device 600 to which the second copying method is applied. The copy source storage device 600 and copy destination storage device 600 have the same constitution. In the second copying method, there is no portion corresponding to the data generating portion 300 shown in the first data generating method. Storage to the memory 611 is accomplished just by storing one copy of digital content simply encoded to the memory 611. The digital copy input 601 inputs original encoded digital content, or encoded digital content output from the digital copy output 603 of the storage device 600 or from another copy source storage device 600 and stores that content to the memory 611.
  • The [0050] decoder 614 decodes the encoded digital content stored in memory 611 and outputs the digital content to the D/A converter 612 and encoder 613. The D/A converter 612 converts the digital content output by the decoder 614 to analog content and outputs the analog content from the analog content output 602. The parameter deterioration mechanism 615 converts the encoding parameters of the digital content output by the decoder 614 to further deteriorated parameters and outputs the parameters to the encoder. The encoder 613 encodes the digital content output by the decoder 614 with the encoding parameters output from the parameter deterioration mechanism 615 and outputs the encoded content to the digital copy output 603.
  • The [0051] storage devices 600 stores digital content input from outside the system and outputs the content in an analog format to be played back or in a digital format to be copied. In order to prevent complete copying of digital contents, the storage device 600 degrades the quality of the digital content from that stored in the memory 611 and outputs that content when performing digital copying. When playing back the content, the storage device outputs the content only in the analog format.
  • For example, when high-quality digital content stored in [0052] memory 611 is played back, the digital content is decoded by the decoder 614, undergoes D/A conversion by the D/A converter 612, and is output in analog form through the analog content output 602. Because the digital content is degraded by D/A conversion, that content cannot be returned to the same quality as the original digital content by A/D conversion. Also, when high-quality digital content stored in memory 611 is copied, the digital content is decoded by the decoder 614, encoded by the encoder 613, and output outside the system through the digital copy output 603. The encoding parameters used by the encoder 613 are found by degrading the encoding parameters of the highest quality digital content stored in the memory 611 with the parameter deterioration mechanism 615. Because the encoding parameters of the digital content can be decoded by the decoder 614, those encoding parameters are deteriorated. For example, the encoding parameters are degraded by reducing the quantum bit number or sampling rate. Because the encoder 613 uses these degraded encoding parameters, the quality of the digital content output becomes degraded compared that of the highest quality digital content stored in memory 611. The creation of copies of equivalent quality from the digital content output is thereby prevented.
  • As above, with the second copying method relating to the present invention, the quality of the digital content stored in the memory of the copy source storage device is degraded and output to a copy destination storage device. Copying is thereby performed with the content in a degraded state. Also, digital copying of a complete copy can be prevented. The [0053] parameter deteriorating mechanism 615 automatically deteriorates the encoding parameters. Therefore, when a user outputs a digital copy from the memory 611, the user cannot touch those encoding parameters.
  • A third copying method relating to the present invention is explained next using FIG. 8. In the third copying method relating to the present invention, the usable encoded digital content in the set of encrypted encoded digital content stored in the memory of the copy source storage device is changed and output to a copy destination storage device, with encoded digital content which was previously usable deleted. Digital copying of a complete copy can thereby be prevented. [0054]
  • For digital output with the object of copying in the first copying method, the usable encoded digital content is changed by first decrypting the set of encrypted encoded digital content stored in the memory and the set of encrypted encoded digital content, wherein the encoded digital content of lesser quality is usable, is output. In the third copying method, however, the good quality encoded digital content, which is usable when stored in the memory, is removed from the set of encrypted encoded digital content before decryption. [0055]
  • The storage device to which is applied the third copying method relating to the present invention is constituted by replacing the [0056] digital output portion 700 of the storage device 200 with the digital output portion shown in FIG. 8. Other elements constituting the storage device 200, such as the memory 212, data generating portion 300, and analog output portion 400, are the same as in the storage device 200 shown in FIG. 1. Specifically, the set of encrypted encoded digital content 500, in the data format shown in FIG. 5, is stored in the memory 212. The deletion mechanism 813 determines the usable encoded digital content from the set of encrypted encoded digital content stored in memory 212, removes that encoded digital content and the usability information corresponding thereto, and sends this content and information to the decryption mechanism 811. If there is no usable encoded digital content in the set of encrypted encoded digital content, the deletion mechanism 813 is just bypassed. The decryption mechanism 811 uses the decryption key output by the decryption key storing portion 812 and decrypts the set of encrypted encoded digital content sent from the deletion mechanism 813.
  • As above, in the third copying method relating to the present invention, the previously usable encoded digital content is removed and output from the set of encrypted encoded digital content stored in memory of the copy source storage device. The quality of the copied content can thereby be deteriorated in an order determined by the creator of the set of encrypted encoded digital content. Also, complete copying by digital copying can be prevented. Even if the encryption key is decoded, the use of high-quality digital content in copying is prevented. [0057]
  • Next, a fourth copying method relating to the present invention is explained using FIG. 9. The first copying method is a method wherein the encoded digital content itself is encrypted a plurality of times and decrypted each time a copy is made. The fourth copying method is a method wherein the encoded digital content is encrypted with mutually different content keys, and the content keys are encrypted a plurality of times and decrypted when a copy is made. [0058]
  • The set of encrypted encoded [0059] digital content 900 shown in FIG. 9 comprises encoded digital content 1 (911), 2 (921), 3 (931), content keys corresponding to each copy of encoded digital content 1 (913), 2 (923), 3 (933), and usability information corresponding to each content key 1 (912), 2 (922), 3 (932). This explanation uses three sets of encoded digital content, content keys, and usability information, but there is no limit to the number of these groups included in the set of encrypted encoded digital content.
  • Each copy of encoded digital content is encrypted with its content key [0060] 1 (913), 2 (923), 3 (933). The content keys 1 (913), 2 (923), 3 (933) may be the same encryption key or different encryption keys. Also, the content keys each have appended usability information corresponding thereto and are encrypted, along with the usability information, different numbers of times with the key K. The initial values V of the usability information appended to each of the content keys are all the same constant.
  • When the above mentioned set of encrypted encoded [0061] digital content 900 is copied from the copy source storage device to the copy destination storage device, the copy source storage device decrypts and outputs the content key and associated usability information one time. When the number of encryptions of the content key and usability information matches the number of copies, meaning the number of decryptions, of the set of encrypted encoded digital content 900, the content key and usability information are returned to a state wherein encryption has not been performed. At this time, the content key becomes usable. Also, the usability information matches the initial value V and shows that the content key is usable. The copy destination storage device can decrypt and use the encoded digital content using the corresponding content key. When the number of encryptions of the content key and usability information does not match the number of copies, meaning the number of decryptions, of the set of encrypted encoded digital content 900, the content key and usability information are in a state where encryption or decryption has been performed and cannot be used. As a result, the corresponding encoded digital content is unusable.
  • Consequently, it becomes possible to change the usable encoded digital content on the copy source storage device and copy destination storage device by performing decryption when a copy is made. Also, the relationship between the number of copies and the usable encoded digital content can be determined when the set of encrypted encoded [0062] digital content 900 is generated.
  • The constitution of the storage device to which the fourth copying method is applied has the same constitution as the [0063] storage device 200 shown in FIG. 1. However, the encryption mechanism 316 of the data generating portion 300 encrypts each copy of encoded digital content in the set of encrypted encoded digital content one time only with the corresponding content key. Also, the encryption mechanism 316 uses a separate encryption key and encrypts the usability information 1 (912) and content key 1 (913) zero times, the usability information 2 (922) and content key 2 (923) one time, and the usability information 3 (932) and content key 3 (933) two times. This decryption may also be applied to the encrypted encoded digital content. The decryption mechanism 711 of the digital output portion 700 decrypts the usability information and content key (and encoded digital content) corresponding to each copy of encoded digital content one time only. Also, the decoder 430 of the analog output portion 400 carries out processing to decrypt the usable encoded digital content with the corresponding content key.
  • As discussed above, with the fourth copying method relating to the present invention, the usable encoded digital content in the set of encrypted encoded [0064] digital content 900 is changed by performing decryption when a copy is made from the copy source storage device to the copy destination storage device. It thereby becomes possible to change the quality of the content each time a copy is made in an order determined by the creator of the set of encrypted encoded digital content. Also, digital copying of a complete copy can be prevented.
  • A second data generating method relating to the present invention is explained next. In the first data generating method, content data with a plurality of different qualities is generated by changing the encoded parameters of the input content and the set of encrypted encoded digital content is generated. For artistic digital content such as music or images, the quality of the digital content can be changed by changing encoding parameters such as the quantum bit number and sampling rate. On the other hand, for digital content with the object of transmitting information such as text, the quality of that digital content can be changed by changing the amount of information transmitted. In the second data generating method, therefore, data comprising content of reduced quality is generated by deleting or hiding by encryption part of the content input. [0065]
  • The data generating device to which the second data generating method is applied has the constitution of the [0066] data generating device 100. However, the data generating device 100 has the constitution of the data generating portion 1000 shown in FIG. 10 instead of the data generating portion 300. The digital content input to the digital content input 201 in FIG. 1 is input to the data generating portion 1000. The data generating portion 1000 converts the input digital content to three sets of data, data 1, data 2, data 3, with mutually different portions deleted by the converting portion 1011. The conversion to data with part of the digital content deleted is performed by extracting the undeleted portions from the entire digital content. The amount of data output by the converting portion 1011 can be controlled from outside the system. Here, this amount is three, but may also be a number other than three. It is also possible to hide part of the data with encryption instead of deletion. In this case, the encryption key used for the encryption can be provided from outside the system. The three sets of converted data are data 1 with none of the input digital content deleted, data 2 with the final half of the input digital content deleted, and data 3 with the final three quarters of the input digital content deleted. Here, final portion means the portion of the input digital content input later by the data generating device 100. Final portion may also mean that portion used temporally later in normal use of the content. The scope of each deletion can be indicated from outside the data generating portion 1000. Of the encoded digital content, data 1 is entirely usable, data 2 is half usable, and for data 3, only one-quarter is not deleted. Accordingly, of the three sets of data, data 1 is of the highest quality, data 2 is of the next best quality, and data 3 is of the lowest quality. The three sets of data generated in this way have usability information added by the usability information adding portion 318 in the same way as in the first data generating method, are encrypted zero times, one time, and two times respectively using a shared key K by the encryption mechanism 316, and are collected in a single set of data, thereby having the same effect as the set of encrypted encoded digital content generated by the first data generating method. Performing decryption one time when a copy is made results in the generation of data for which the usable content can be changed in the order of data 1, data 2, data 3. This data becomes data of decreasing quality as copying is repeated.
  • As above, the data generated by the second data generating method relating to the present invention can have the usable content changed by decryption in the same way as the set of encrypted encoded data generated by the first data generating method relating to the present invention. Accordingly, the data generated by the second data generating method relating to the present invention can undergo the first, third, and fourth copying methods relating to the present invention. [0067]
  • A fifth copying method relating to the present invention is explained next using FIGS. 11, 12, and [0068] 13. In the fifth copying method relating to the present invention, complete copying by digital copying can be prevented by degrading the quality of the digital content stored in the memory of the copy source storage device 1 (1301) shown in FIG. 13 and outputting that content to the copy destination storage device 2 (1302). For artistic digital content such as music or images, the quality of the digital content can be degraded by changing encoding parameters such as the quantum bit number and sampling rate. On the other hand, for digital content with the object of transmitting information such as text, the quality of that digital content can be degraded by removing part of the transmitted information.
  • In the fifth copying method, there is no element corresponding to the [0069] data generating portion 300 shown in the first data generating method and storage to memory 1111 is accomplished just by storing the single copy of digital content to the memory 1111. The digital content input 1101 inputs and stores to memory 1111 original digital content or digital content output from the digital copy output 1102 of the storage device 1100 or digital content output from another copy source storage device 1100.
  • The storage device [0070] 1 (1301) in FIG. 13 corresponds to the storage device 1100 shown in FIG. 11. The storage device 2 (1302) is a storage device comprising memory. The storage device 2 (1302) may also have the constitution of the storage device 1100 shown in FIG. 11. The storage device 1 (1301) processes and outputs the stored digital content through the digital transmission path 1303, and makes a copy of the digital content to the storage device 2 (1302). The digital transmission path 1303 can have any physical constitution, logical constitution, or scale so long as the storage device 1 (1301) and storage device 2 (1302) can be connected.
  • The [0071] storage device 1100 shown in FIG. 11 comprises a digital content input 1101, memory 1111, a converter 1112, and a digital copy output 1102. Furthermore, the storage device 1100 may also comprise a reproducing portion 1113 for playing back digital content stored in memory 1111. The memory 1111 stores digital content input from the digital content input 1101. The converter 1112 comprises a selector 1121, deteriorating mechanism 1122, deterioration method extracting portion 1123, and deterioration scope controller 1124. The converter outputs the digital content stored in the memory 1111, with part deleted or hidden by encryption, from the digital copy output 1102.
  • The [0072] digital content 1200, with added deterioration conditions, shown in FIG. 12 comprises digital content 1201 and deterioration conditions 1202. The digital content 1201 is digital data such as images, music, or text. The deterioration conditions 1202 are parameters indicating the scope and method for degrading the digital content 1201 when a digital copy is made of the digital content 1201.
  • The [0073] storage device 1100 stores the digital content input from the digital content input 1101 to the memory 1111. The input digital content may also be digital content 1200 with added deterioration conditions, wherein deterioration conditions 1202 showing the scope and method for deteriorating the digital content 1201 are added by the converter 1112 when a copy is made. When the stored digital content is output outside the system, the storage device 1100 limits the use of the copied content by deleting or hiding with encryption part of the digital content stored in memory 1111, degrading the quality of the content, and outputs the content. At this time, in the case of digital content 1200 with added deterioration conditions, the converter 1112 uses the added deterioration conditions 1202 and deletes or hides with encryption part of the digital content 1201 and outputs the content from the digital copy output 1102. At this time, the deterioration method extracting portion 1123 determines the deterioration method, such as encryption or deletion, from the deterioration conditions 1202 and controls the deterioration mechanism 1122. The deterioration scope controller 1124 determines the scope of deterioration from the deterioration conditions 1202 and controls the selector 1121. The selector 1121 receives the original digital content stored in memory 1111 and the digital content deteriorated by the deterioration mechanism 1122. And by control of the deterioration scope controller 1124, in each portion of the digital content the selector 1121 chooses the original digital content of the deteriorated digital contents, and outputs it from the digital copy output 1102. Thereby, the converter 1112 generates the digital content which deteriorated partially. The deterioration conditions 1202 can be applied when the digital content with added deterioration conditions 1200 is generated. In the case of digital content without added deterioration conditions, the converter 1112 uses predetermined conditions to delete or hide by decrypting part of the digital content and outputs the content from the digital copy output 1102. The predetermined conditions for the converter 1112 can be established when the storage device 1100 is manufactured.
  • When the [0074] reproduction portion 1113 plays back the digital content stored in the memory 1111 as digital data, the reproduction portion 1113 reproduces this data inside the storage device 1100. Therefore, it prevents taking out the complete copy of the digital content from the reproduction portion 1113 outside the system.
  • If digital content is text data, the [0075] reproduction portion 1113 outputs the screen information for displaying the text of contents to an external display out of the storage device 1100. In this case, because it is difficult to reconstruct text data from the screen information, it can prevent creating the complete copy of digital content from the output of a reproduction portion 1113.
  • On the other hand, when playing back digital contents as analog data, a [0076] reproduction portion 1113 outputs analog information to the display or speaker besides the storage device 1100. Consequently, it can prevent creating the complete copy of digital content from the output of a reproduction portion 1113.
  • Accordingly, with the fifth copying method relating to the present invention, a system [0077] 1300 comprises a storage device 1 (1301) and storage device 2 (1302) having the same constitution as the storage device 1100 and a digital transmission path 1303 connecting those; and the quality of the digital content copied to the storage device 2 (1302) is degraded compared to the digital content stored in the storage device 1 (1301), when the digital content is copied from the copy source storage device 1 (1301) to the copy destination storage device 2 (1302). Copying can thereby be performed with the content in a deteriorated state. Digital copying of a complete copy can be prevented as well.
  • The present invention has the effect of being able to support a user's desire to acquire digital content while protecting the rights of creators of digital content. [0078]

Claims (38)

What is claimed is:
1. A method for generating second digital content from a first digital content, the method comprising:
producing a first copy of digital content from the first digital content; and
producing a second copy of digital content based on the first digital content;
encrypting the second copy of digital content to produce a first encrypted copy of digital content,
wherein the second digital content comprises the first copy of digital content and the first encrypted copy of digital content.
2. The method of claim 1 wherein the first copy of digital content has less information than the first digital content.
3. The method of claim 1 wherein a level of quality of the second copy of digital content is lower than a level of quality of the first copy of digital content.
4. The method of claim 1 wherein the second copy of digital content is produced from the first copy of digital content.
5. The method of claim 1 wherein the step of producing a first copy of digital content includes performing an encoding operation on the first digital content.
6. The method of claim 1 wherein the step of producing a first copy of digital content includes performing a data compression operation on the first digital content.
7. The method of claim 1 wherein the step of producing a first copy of digital content includes deleting a portion of the first digital content.
8. The method of claim 1 further including:
producing a third copy of digital content based on the first digital content;
encrypting the third copy of digital content to produce a second encrypted copy of digital content; and
encrypting the second copy of encrypted digital content to produce a twice-encrypted copy of digital content,
wherein the second digital content further comprises the twice-encrypted copy of digital content.
9. The method of claim 8 wherein levels of quality of the first copy of digital content, the second copy of digital content, and the third copy of digital content are different from each other.
10. The method of claim 8 wherein the step of producing a first copy of digital content includes encoding the first digital content with a first encoding parameter and the step of producing a second copy of digital content includes encoding the first digital content with a second encoding parameter different from the first encoding parameter.
11. A method for generating second digital content from a first digital content comprising:
producing one or more successive copies of the first digital content, at least some of the one or more successive copies having different levels of quality; and
encrypting each successive copy a successively increasing number of times to produce one or more successive encrypted copies, so that an nth successive encrypted copy is encrypted one additional time more than the (n−1)th successive encrypted copy,
wherein the second digital content comprises the one or more successive encrypted copies.
12. The method of claim 11 wherein each successive copy has a level of quality that is lower than a level of quality of a preceding copy.
13. The method of claim 11 wherein the step of producing one or more successive copies includes encoding the first digital content.
14. The method of claim 11 wherein each copy is produced by encoding the first digital content using an encoding parameter different from the encoding parameters used to produce the other copies.
15. The method of claim 11 wherein each of the successive copies of the first digital content is produced by applying one or more data compression operations on the first digital content one or more times.
16. The method of claim 11 wherein each of the successive copies of the first digital content is produced by deleting digital content from a preceding copy of the first digital content.
17. A method for copying protected digital content produced according to claim 11 comprising:
decrypting the protected digital content to produce a copy of the protected digital content; and
producing an output representative of the copy of the protected digital content, wherein the output is suitable for storage on a storage medium.
18. A method for copying protected digital content produced according to claim 11 comprising:
decrypting the protected digital content to produce a copy of the protected digital content, wherein the protected digital content includes an unencrypted copy and one or more successive encrypted copies, the step of decrypting including deleting the unencrypted copy; and
producing an output representative of the copy of the protected digital content, wherein the output is suitable for storage on a storage medium.
19. A method for producing a copy of digital information comprising:
accessing first digital information from a first storage medium, the first digital information comprising a plurality of copies of digital content, each successive copy of digital content being encrypted a successively increasing number of times, a first copy of the digital content being unencrypted, a second copy of the digital content being encrypted once;
decrypting the first digital information to produce second digital information so that each copy of digital content is encrypted one less number of times, the second copy of digital content being unencrypted; and
outputting the second digital information in a form suitable for storage on a second storage medium.
20. The method of claim 19 wherein at least some of the copies of digital content have different levels of quality.
21. The method of claim 19 wherein each copy of digital content is encoded with an encoding parameter different from encoding parameters of the other copies of digital content, thus producing different levels of quality among the plurality of copies of digital content.
22. The method of claim 19 further including removing the first copy of digital content, the second digital information thereby being without the first copy of digital content.
23. A method for generating second digital content from a first digital content comprising:
encrypting each of two or more copies of the first digital content to produce a plurality of encrypted copies, each of the encrypted copies having a corresponding encryption key; and
encrypting each of the corresponding encryption keys zero or more times to produce a plurality of encrypted keys, so that each corresponding encryption key is encrypted a number of times that is different from the other corresponding encryption keys,
the second digital content comprising the plurality of encrypted copies and the plurality of encrypted keys.
24. The method of claim 23 wherein at least some of the two or more copies of the first digital content have a level of quality that is different from the level of quality of the other of the two or more copies of the first digital content.
25. The method of claim 23 wherein successive ones of the two or more copies of the first digital content each has a level of quality that is less than a level of quality of a preceding copy.
26. A device for producing from a first digital content playback content that is suitable for playback comprising:
an first circuit operable for receiving the first digital content and for receiving first information relating to a level of quality, the first circuit further being operable for producing a version of digital content, the version of digital content being a copy of the first digital content having a level of quality determined by the first information; and
a second circuit operable for receiving the version of digital content from the first circuit and for receiving second information relating to an encryption count, the second circuit further operable for producing an encrypted version of digital content, the encrypted version of digital content being encrypted a number of times equal to the encryption count,
wherein the playback content comprises a plurality of encrypted versions of digital content, each encrypted version of digital content being encrypted a number of times different from the other encrypted versions of digital content.
27. The device of claim 26 wherein each version of digital content has a level of quality less than a level of quality of a preceding version of digital content.
28. The apparatus of claim 26 wherein the first circuit produces a version of digital content by deleting one or more portions of the first digital content.
29. A device for producing reproducible digital content from first digital content comprising:
first means for producing a plurality of copies of the first digital content, at least some of the copies having a level of quality different from a level of quality of the other copies; and
second means, operatively coupled the first means, for producing a copy of encrypted digital content for each copy of the first digital content, each successive copy of encrypted digital content being encrypted one time more than a preceding copy of encrypted digital content,
wherein the reproducible digital content comprises the plurality of copies of encrypted digital content.
30. The device of claim 29 wherein each successive copy of the first digital content has a level of quality less than a preceding copy of the digital content.
31. A storage device for storing digital content comprising:
a storage medium;
a first circuit operable to produce encrypted digital content from a first digital content, the encrypted digital content having an associated encryption key, the first circuit coupled to store the encrypted digital content in the storage medium; and
a second circuit operable to produce an encrypted key, the encrypted key being the associated encryption key encrypted zero or more times, the second circuit coupled to store the encrypted key in the storage medium,
wherein the storage medium is configured to receive one or more encrypted digital content from the first means and to receive one or more encrypted keys from the second means.
32. The storage device of claim 31 wherein the first circuit is further operable for reducing a level of quality of the first digital content so that at least some of the one or more encrypted digital content have levels of quality that are different from the levels of quality of the other encrypted digital content.
33. Apparatus for copying first digital content produced according to claim 11 comprising:
a first circuit operable for decrypting the first digital content to produce second digital content, the second digital content comprising unencrypted digital content and one or more copies of encrypted digital content, each copy of encrypted digital content being encrypted one or more times; and
an output circuit for producing an output of the second digital content.
34. Apparatus for copying digital content produced according to claim 11 comprising:
a first circuit operable for decrypting the digital content to produce second digital content, the digital content comprising a first unencrypted digital content and a first plurality of one or more copies of encrypted digital content, the first circuit operable for removing the first unencrypted digital content; and
an output circuit for producing an output of the second digital content, the second digital content comprising a second unencrypted digital content and a second plurality of one or more copies of encrypted digital content.
35. A storage device for storing digital content comprising:
a storage medium;
first means for encrypting first digital content to produce encrypted digital content, the encrypted digital content having an associated encryption key; and
second means for encrypting the associated encryption key zero or more times to produce an encrypted key,
wherein the storage medium is configured to receive one or more encrypted digital content from the first means and to receive one or more encrypted keys from the second means.
36. The storage device of claim 35 wherein the first means further includes means for reducing a level of quality of the first digital content so that at least some of the one or more encrypted digital content have levels of quality that are different from the levels of quality of the other encrypted digital content.
37. Apparatus for copying digital content comprising:
means for decrypting first digital content to produce second digital content, the first digital content comprising a plurality of one or more first copies of encrypted digital content, each first copy being encrypted zero or more times, the second digital content comprising unencrypted digital content and a plurality of one or more second copies of encrypted digital content, each second copy of digital content being encrypted zero or more times; and
means for producing an output of the second digital content.
38. Apparatus for copying digital content comprising:
means for decrypting first digital content to produce second digital content, the first digital content comprising a first unencrypted digital content and a first plurality of one or more copies of encrypted digital content, the means for decrypting including means for removing the first unencrypted digital content; and
means for producing an output of the second digital content, the second digital content comprising a second unencrypted digital content and a second plurality of one or more copies of encrypted digital content.
US10/013,607 2001-02-20 2001-12-10 Digital copying method and storage device for digital content Expired - Fee Related US7225340B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP01-042891 2001-02-20
JP2001042891A JP4271876B2 (en) 2001-02-20 2001-02-20 Digital content generation method and related apparatus

Publications (2)

Publication Number Publication Date
US20020114455A1 true US20020114455A1 (en) 2002-08-22
US7225340B2 US7225340B2 (en) 2007-05-29

Family

ID=18905136

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/013,607 Expired - Fee Related US7225340B2 (en) 2001-02-20 2001-12-10 Digital copying method and storage device for digital content

Country Status (2)

Country Link
US (1) US7225340B2 (en)
JP (1) JP4271876B2 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050190917A1 (en) * 2004-02-26 2005-09-01 Noh Mi J. Circuits, apparatus, methods and computer program products for providing conditional access and copy protection schemes for digital broadcast data
US20060143129A1 (en) * 2003-02-07 2006-06-29 Jukka Holm Software distribution
US20070088778A1 (en) * 2003-09-29 2007-04-19 Sony Corporation Communication apparatus, communication method and communication program
US7606362B1 (en) * 2005-01-25 2009-10-20 Altera Corporation FPGA configuration bitstream encryption using modified key
US20090265557A1 (en) * 2003-09-12 2009-10-22 Hank Risan Preventing unauthorized distribution of media content within a global network
US7725738B1 (en) 2005-01-25 2010-05-25 Altera Corporation FPGA configuration bitstream protection using multiple keys
US7734043B1 (en) 2005-01-25 2010-06-08 Altera Corporation Encryption key obfuscation and storage
US7818584B1 (en) 2005-01-25 2010-10-19 Altera Corporation One-time programmable memories for key storage
US8126987B2 (en) 2009-11-16 2012-02-28 Sony Computer Entertainment Inc. Mediation of content-related services
US8433759B2 (en) 2010-05-24 2013-04-30 Sony Computer Entertainment America Llc Direction-conscious information sharing
US8604823B1 (en) 2006-05-16 2013-12-10 Altera Corporation Selectively disabled output
US8787454B1 (en) * 2011-07-13 2014-07-22 Google Inc. Method and apparatus for data compression using content-based features
US8966557B2 (en) 2001-01-22 2015-02-24 Sony Computer Entertainment Inc. Delivery of digital content
US9483405B2 (en) 2007-09-20 2016-11-01 Sony Interactive Entertainment Inc. Simplified run-time program translation for emulating complex processor pipelines
US20170329986A1 (en) * 2015-06-24 2017-11-16 Tencent Technology (Shenzhen) Company Limited Method and device for processing multimedia file

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7242773B2 (en) * 2002-09-09 2007-07-10 Sony Corporation Multiple partial encryption using retuning
CN101950343A (en) 2002-08-08 2011-01-19 晟碟以色列有限公司 Digital rights management method and integrated circuit
US7979700B2 (en) 2002-08-23 2011-07-12 Sandisk Corporation Apparatus, system and method for securing digital documents in a digital appliance
US20040039932A1 (en) * 2002-08-23 2004-02-26 Gidon Elazar Apparatus, system and method for securing digital documents in a digital appliance
DE602005017369D1 (en) * 2004-02-03 2009-12-10 Sandisk Secure Content Solutio PROTECTION OF DIGITAL DATA CONTENT
US8402283B1 (en) 2004-08-02 2013-03-19 Nvidia Corporation Secure content enabled drive system and method
US8359332B1 (en) 2004-08-02 2013-01-22 Nvidia Corporation Secure content enabled drive digital rights management system and method
US8788425B1 (en) 2004-12-15 2014-07-22 Nvidia Corporation Method and system for accessing content on demand
US8346807B1 (en) 2004-12-15 2013-01-01 Nvidia Corporation Method and system for registering and activating content
US8875309B1 (en) 2004-12-15 2014-10-28 Nvidia Corporation Content server and method of providing content therefrom
US8751825B1 (en) * 2004-12-15 2014-06-10 Nvidia Corporation Content server and method of storing content
JP2006295344A (en) * 2005-04-06 2006-10-26 Toshiba Corp Content processor
US8893299B1 (en) 2005-04-22 2014-11-18 Nvidia Corporation Content keys for authorizing access to content
JP4440825B2 (en) 2005-05-17 2010-03-24 株式会社バンダイナムコゲームス Game program recording medium
JP2007013735A (en) * 2005-06-30 2007-01-18 Toshiba Corp Content server device
JP4728060B2 (en) 2005-07-21 2011-07-20 株式会社日立製作所 Storage device
JP2009508412A (en) * 2005-09-08 2009-02-26 サンディスク コーポレーション Mobile memory system for secure storage and distribution of media content
JP4814615B2 (en) * 2005-10-27 2011-11-16 日本放送協会 Content encryption apparatus, method and program thereof, and content decryption apparatus, method and program thereof
US8839005B2 (en) * 2006-09-13 2014-09-16 Sandisk Technologies Inc. Apparatus for transferring licensed digital content between users
JP4527173B2 (en) * 2009-01-23 2010-08-18 株式会社バンダイナムコゲームス Game program recording medium
JP5012945B2 (en) * 2010-04-12 2012-08-29 富士通株式会社 Content management program, method and apparatus

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5991500A (en) * 1993-04-02 1999-11-23 Sony Corporation Copy control for a video signal with copyright signals superimposed as predetermined bits in the VBID data of the video signal
US6862582B2 (en) * 1998-10-16 2005-03-01 Matsushita Electric Industrial Co., Ltd. Production protection system dealing with contents that are digital production

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6598164B1 (en) * 1998-04-13 2003-07-22 Nüp2 Incorporated Device and method for reducing piracy of digitized information
JPH11296308A (en) * 1998-04-14 1999-10-29 Fujitsu Ltd Method for transferring data and method for transferring enciphered data and signal processor and dvd device
SG97852A1 (en) * 2000-02-25 2003-08-20 Kent Ridge Digital Labs Method and apparatus for digital content copy protection
US6748537B2 (en) * 2001-11-15 2004-06-08 Sony Corporation System and method for controlling the use and duplication of digital content distributed on removable media

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5991500A (en) * 1993-04-02 1999-11-23 Sony Corporation Copy control for a video signal with copyright signals superimposed as predetermined bits in the VBID data of the video signal
US6862582B2 (en) * 1998-10-16 2005-03-01 Matsushita Electric Industrial Co., Ltd. Production protection system dealing with contents that are digital production

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8966557B2 (en) 2001-01-22 2015-02-24 Sony Computer Entertainment Inc. Delivery of digital content
US9910653B2 (en) 2003-02-07 2018-03-06 Nokia Technologies Oy Software distribution
US20060143129A1 (en) * 2003-02-07 2006-06-29 Jukka Holm Software distribution
US20090265793A1 (en) * 2003-09-12 2009-10-22 Hank Risan Preventing unauthorized distribution of media content within a global network
US20090265557A1 (en) * 2003-09-12 2009-10-22 Hank Risan Preventing unauthorized distribution of media content within a global network
US20090265549A1 (en) * 2003-09-12 2009-10-22 Hank Risan Preventing unauthorized distribution of media content within a global network
US8122248B2 (en) 2003-09-12 2012-02-21 Music Public Broadcasting, Inc. Preventing unauthorized distribution of media content within a global network
US20090265789A1 (en) * 2003-09-12 2009-10-22 Hank Risan Preventing unauthorized distribution of media content within a global network
US8667299B2 (en) * 2003-09-12 2014-03-04 Music Public Broadcasting, Inc. Preventing unauthorized distribution of media content within a global network
US8112815B2 (en) 2003-09-12 2012-02-07 Music Public Broadcasting, Inc. Preventing unauthorized distribution of media content within a global network
US8112810B2 (en) 2003-09-12 2012-02-07 Music Public Broadcasting, Inc. Preventing unauthorized distribution of media content within a global network
US20070088778A1 (en) * 2003-09-29 2007-04-19 Sony Corporation Communication apparatus, communication method and communication program
US7991759B2 (en) * 2003-09-29 2011-08-02 Sony Corporation Communication apparatus, communication method and communication program
US20050190917A1 (en) * 2004-02-26 2005-09-01 Noh Mi J. Circuits, apparatus, methods and computer program products for providing conditional access and copy protection schemes for digital broadcast data
US7773752B2 (en) * 2004-02-26 2010-08-10 Samsung Electronics Co., Ltd. Circuits, apparatus, methods and computer program products for providing conditional access and copy protection schemes for digital broadcast data
US8826038B1 (en) 2005-01-25 2014-09-02 Altera Corporation FPGA configuration bitstream protection using multiple keys
US7725738B1 (en) 2005-01-25 2010-05-25 Altera Corporation FPGA configuration bitstream protection using multiple keys
US8363833B1 (en) 2005-01-25 2013-01-29 Altera Corporation FPGA configuration bitstream encryption using modified key
US8433930B1 (en) 2005-01-25 2013-04-30 Altera Corporation One-time programmable memories for key storage
US7606362B1 (en) * 2005-01-25 2009-10-20 Altera Corporation FPGA configuration bitstream encryption using modified key
US9208357B1 (en) 2005-01-25 2015-12-08 Altera Corporation FPGA configuration bitstream protection using multiple keys
US7818584B1 (en) 2005-01-25 2010-10-19 Altera Corporation One-time programmable memories for key storage
US8750503B1 (en) * 2005-01-25 2014-06-10 Altera Corporation FPGA configuration bitstream encryption using modified key
US9054859B1 (en) * 2005-01-25 2015-06-09 Altera Corporation FPGA configuration bitstream encryption using modified key
US7734043B1 (en) 2005-01-25 2010-06-08 Altera Corporation Encryption key obfuscation and storage
US8604823B1 (en) 2006-05-16 2013-12-10 Altera Corporation Selectively disabled output
US9755650B1 (en) 2006-05-16 2017-09-05 Altera Corporation Selectively disabled output
US10720927B1 (en) 2006-05-16 2020-07-21 Altera Corporation Selectively disabled output
US9483405B2 (en) 2007-09-20 2016-11-01 Sony Interactive Entertainment Inc. Simplified run-time program translation for emulating complex processor pipelines
US8126987B2 (en) 2009-11-16 2012-02-28 Sony Computer Entertainment Inc. Mediation of content-related services
US8433759B2 (en) 2010-05-24 2013-04-30 Sony Computer Entertainment America Llc Direction-conscious information sharing
US8787454B1 (en) * 2011-07-13 2014-07-22 Google Inc. Method and apparatus for data compression using content-based features
US9282330B1 (en) 2011-07-13 2016-03-08 Google Inc. Method and apparatus for data compression using content-based features
US20170329986A1 (en) * 2015-06-24 2017-11-16 Tencent Technology (Shenzhen) Company Limited Method and device for processing multimedia file

Also Published As

Publication number Publication date
JP2002244929A (en) 2002-08-30
US7225340B2 (en) 2007-05-29
JP4271876B2 (en) 2009-06-03

Similar Documents

Publication Publication Date Title
US7225340B2 (en) Digital copying method and storage device for digital content
EP0817185B1 (en) Enciphering method, deciphering method, recording and reproducing method, deciphering device, deciphering unit device, recording medium, recording-medium manufacturing method, and key control method
CN1287249C (en) Access control for digital content
CN1959831B (en) Transmission/reception system, recording apparatus and method
CN100481765C (en) Access control for digital content
JP4850075B2 (en) Data storage method, data reproduction method, data recording device, data reproduction device, and recording medium
CN100461196C (en) Information processor, information processing method, and computer program
US7324974B1 (en) Digital data file encryption apparatus and method
US6526510B1 (en) Signal reproducing method and apparatus, signal recording method and apparatus and signal recording system
KR20000064791A (en) Method and system for transmitting content information and additional information related thereto
KR20060017774A (en) Information server, information device, information processing system, information processing method, and information processing program
JP2002244929A5 (en) Digital content generation method and related apparatus
KR20060106654A (en) Content information providing system, content information providing server, content reproduction apparatus, content information providing method, content reproduction method and computer program
JP2005124149A (en) Access control for digital content
JP4122777B2 (en) Content recording / playback device
JP2005124147A (en) Access control for digital video stream
JP4666302B2 (en) Access control for digital content
JP2003317376A (en) Information management apparatus and method, recording medium, and program
JP4482970B2 (en) DVD recorder, DVD recorder recording / reproducing method, and program recording medium
JP2004139473A (en) Content recording device, reproduction device, record reproduction device, and storage medium
US20020141737A1 (en) Audio data recording medium and related apparatuses
EP1051011B1 (en) System for preventing an illegal copy of digital contents
JP2006041570A (en) Information processing system, information processing apparatus, information processing method, and program
JP2004140757A (en) Encryption method of content, decoding method of decoding encrypted data, and apparatus of the same
US20070189738A1 (en) Contents recorder, contents processing method, and computer readable medium storing contents processing program

Legal Events

Date Code Title Description
AS Assignment

Owner name: HITACHI, LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ASAHI, TAKESHI;KITAHARA, JUN;OWADA, TORU;REEL/FRAME:012387/0822

Effective date: 20011114

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FEPP Fee payment procedure

Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: HITACHI CONSUMER ELECTRONICS CO., LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HITACHI, LTD.;REEL/FRAME:030802/0610

Effective date: 20130607

AS Assignment

Owner name: HITACHI MAXELL, LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HITACHI CONSUMER ELECTRONICS CO., LTD.;HITACHI CONSUMER ELECTRONICS CO, LTD.;REEL/FRAME:033694/0745

Effective date: 20140826

FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: MAXELL, LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HITACHI MAXELL, LTD.;REEL/FRAME:045142/0208

Effective date: 20171001

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20190529